{"id":184,"date":"2019-10-17T10:58:39","date_gmt":"2019-10-17T10:58:39","guid":{"rendered":"https:\/\/www.dianapps.com\/blog\/?p=184"},"modified":"2019-10-17T10:58:39","modified_gmt":"2019-10-17T10:58:39","slug":"ethical-hacking-and-its-methodology","status":"publish","type":"post","link":"https:\/\/www.dianapps.com\/blog\/ethical-hacking-and-its-methodology\/","title":{"rendered":"Ethical Hacking and Its Methodology"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Ethical Hacking is the act of penetrating systems and networks to find out the threats in those systems. It is also a process to crack the vulnerabilities in the network which a malicious attacker may exploit, causing loss of data, financial loss, and other significant damages.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Coming to its methodology, ethical hackers use the same methods and tools as used by malicious (black hat) hackers, after the permission of an authorized person. Whereas on the other hand, evil hackers use the methods in disgracing and illegal ways.<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"What-is-an-Ethical-Hacker\"><\/span><strong>What is an Ethical Hacker?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Mostly an Ethical Hacker is coined as a \u2018White Hat Hacker.\u2019 An ethical hacker is information security, computer, and networking expert who systematically attempts to infiltrate computer systems, applications, networks, and other computer resources with the permission of their owners.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The purpose of an ethical hacker is to evaluate the security and identify the vulnerabilities in the system which are exploitable, in systems infrastructure and networks. It is to determine whether unauthorized access or other malicious activities are possible.<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Hacking-Methodology\"><\/span><b>Hacking Methodology<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Following Methodology is adapted by White Hat hackers for Ethical Hacking:<\/span><\/p>\n<p style=\"text-align: justify;\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/image.slidesharecdn.com\/ehpptaxer-141210103707-conversion-gate01-160118055219\/95\/introduction-to-ethical-hacking-14-638.jpg?cb=1453096376\" alt=\"Image result for Hacking Methodology\" \/><\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Phase-1-%E2%80%93-Reconnaissance\"><\/span><span style=\"color: #0000ff;\"><b>Phase 1 \u2013 Reconnaissance<\/b><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">This is a set of techniques like footprinting, scanning, and enumeration along with processes used to discover and find information about the target system. An ethical hacker during reconnaissance attempts to gather as much information about a target system as possible. They follow a seven-step process as listed below:<\/span><\/p>\n<ol style=\"text-align: justify;\">\n<li><b> Information Gathering \u2013<\/b><span style=\"font-weight: 400;\"> The idea over here is to collect as much information as possible about the target which is interesting, new, and of utmost importance. And to achieve this many tools are available which are used by hackers so as to stop any real planned attacks.\u00a0<\/span><\/li>\n<li><b> Determining the network range \u2013<\/b><span style=\"font-weight: 400;\"> After finding out the target IP address, it is time to determine the network range. It is important to determine the maximum number of networks that will give a clear plan and matrix of hacking.<\/span><\/li>\n<li><b> Identifying the active machine \u2013<\/b><span style=\"font-weight: 400;\"> We need to find the active machines that are on the target network range. It is a simple way by performing a ping on the target network. In order to avoid it being caught by the host or rejected, we need to follow a proper suit so as to complete the process successfully.<\/span><\/li>\n<li><b> Finding open ports and access points \u2013<\/b><span style=\"font-weight: 400;\"> After determining the network range and active machine, an ethical hacker proceeds with the port scanning process to retrieve the open TCP and UDP access port points.\u00a0<\/span><\/li>\n<li><b> OS fingerprinting \u2013<\/b><span style=\"font-weight: 400;\"> It is the process of learning whether the operating system is running on the target device. So, OS Fingerprinting is the process in which we compute and determine the identity of a remote host\u2019s operating system.\u00a0<\/span><\/li>\n<li><b> Fingerprinting Services \u2013<\/b><span style=\"font-weight: 400;\"> This is accomplished by sending specially crafted packets to a target machine and then noting down their response. It is analyzed by gathering the information to determine the target OS.\u00a0<\/span><\/li>\n<li><b> Mapping the Network \u2013<\/b><span style=\"font-weight: 400;\"> It is the study of the physical connectivity of networks. In-network mapping, an ethical hacker discovers the devices on the network and their connectivity which is not to be confused with the network discovery or network enumerating that leads to the discovery of their characteristics.\u00a0<\/span><\/li>\n<\/ol>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Types-of-Reconnaissance\"><\/span><b>Types of Reconnaissance<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">It takes place in two parts which are described below:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Active Reconnaissance<\/b><\/td>\n<td><b>Passive Reconnaissance<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Directly connected to a computer system to gain information<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Cannot directly connect to the target system for gaining the information<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Port scanning to find weaknesses in the target system<\/span><\/td>\n<td><span style=\"font-weight: 400;\">DNS Lookup to check all the records of DNS of a given domain name<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Mirroring Website<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Google Search<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Email tracking<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Whois Queries<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">SNMP Sweeps<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Social Networking Sites<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">It is done by tools like Nmap, HT track, Ping<\/span><\/td>\n<td><span style=\"font-weight: 400;\">It is done by using tools like GHDB, Whois, NSlookup<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Nmap-Tool-for-Active-Reconnaissance\"><\/span><b>Nmap Tool for Active Reconnaissance<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Network Mapper is a free, open-source utility for network discovery and security auditing. It is useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. It is designed rapidly to scan large networks but works fine against single hosts. Network mapper runs on all major computer operating systems and official binary packages are available for Linux, Windows and Mac OSX.\u00a0<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Following-are-the-examples-of-Nmap\"><\/span><strong>Following are the examples of Nmap:\u00a0<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">Scan a single IP \/ Range of IP\u2019s<\/span><\/td>\n<td><span style=\"font-weight: 400;\">nmap 192.168.1.1\/nmap 192.168.1.1-20<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Scan a Host<\/span><\/td>\n<td><span style=\"font-weight: 400;\">nmap www.testhostname.com<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Scan a single Port \/ Range of Port<\/span><\/td>\n<td><span style=\"font-weight: 400;\">nmap -p 22 192.168.1.1 \/ nmap -p 1-100 192.168.1.1<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Scan using TCP connect \/ SYN scan<\/span><\/td>\n<td><span style=\"font-weight: 400;\">nmap-sT 192.168.1.1\/nmap-sS 192.168.1.1<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Scan UDP ports<\/span><\/td>\n<td><span style=\"font-weight: 400;\">nmap -sU -p 123,161,162 192.168.1.1<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Detect OS and Services<\/span><\/td>\n<td><span style=\"font-weight: 400;\">nmap -A 192.168.1.1<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Save default output to file<\/span><\/td>\n<td><span style=\"font-weight: 400;\">nmap -oN outputfile.txt 192.168.1.1<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Scan using default safe scripts<\/span><\/td>\n<td><span style=\"font-weight: 400;\">nmap -sV -sC 192.168.1.1<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Heartbleed Testing<\/span><\/td>\n<td><span style=\"font-weight: 400;\">nmap &#8211;script=asn-query, whois, ip-geolocation-maxmind192.168.1.0\/24<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"GHDB-%E2%80%93-Google-Hacking-Database\"><\/span><b>GHDB \u2013 Google Hacking Database<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/4.bp.blogspot.com\/-msBDls_KPHc\/XCECSTjTNnI\/AAAAAAAAAIo\/x4BYi2Ylv-U_wdLslGPVhnyony2z8XVzwCLcBGAs\/s640\/Google-Hacking-Database.png\" alt=\"Image result for GHDB \u2013 Google Hacking Database\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The Google Hacking Database was originally developed by Johnny Long, which uses Google dorks which are google operators used in search strings such as inurl, filetype, allintext, site, cache, and also operators such as +, -, * and more. Googledorks when used correctly, can sometimes reveal interesting and even sensitive information such as error messages, vulnerable servers and websites, login pages, sensitive files, and more.\u00a0<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Following-are-the-examples-of-GHDB\"><\/span><strong>Following are the examples of GHDB:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">[cache:]<\/span><\/td>\n<td><span style=\"font-weight: 400;\">cache:www.xyz.com<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">[info:]<\/span><\/td>\n<td><span style=\"font-weight: 400;\">info:www.xyz.com<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">[related:]<\/span><\/td>\n<td><span style=\"font-weight: 400;\">related:www.xyz.com<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">[inurl:]<\/span><\/td>\n<td><span style=\"font-weight: 400;\">inurl:query<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">[allinurl:]<\/span><\/td>\n<td><span style=\"font-weight: 400;\">allinurl:faq contact<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">[intittle:]<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Movie comedy intittle:top ten<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">[allintittle:]<\/span><\/td>\n<td><span style=\"font-weight: 400;\">allintittle:top ten<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">[intext:]<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Shubham intext:samuel<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">[allintext:]<\/span><\/td>\n<td><span style=\"font-weight: 400;\">allintext:recipes lime coriander<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Phase-2-%E2%80%93-Scanning\"><\/span><span style=\"color: #0000ff;\"><b>Phase 2 \u2013 Scanning<\/b><\/span><span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Collecting more information using complex and aggressive reconnaissance techniques is termed as Scanning<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Scanning is a set of steps and methods that are for identifying live hosts, ports, services and discovering operating systems and architecture of the target system. Identifying vulnerabilities, threats in the network by scanning which is used to create a profile of the target organization.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><strong>Following procedure is to be followed while performing the process of Scanning:<\/strong><\/p>\n<ol style=\"text-align: justify;\">\n<li><span style=\"font-weight: 400;\"> Which Servers are alive\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Specific IP address\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Operating System\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> System Architecture<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Services running on each System<\/span><\/li>\n<\/ol>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Types-of-Scanning-in-Detail\"><\/span><b>Types of Scanning in Detail<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><b>1.Port Scanning<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Port Scanning is a series of messages sent by someone who is attempting to break into a computer system to learn which computer network services, each associated with a renowned port number, the computer provides. It is a favorite approach of computer crackers which gives the attacker an idea of where to probe for weaknesses. Fundamentally, this method consists of sending a message to each port, one by one.\u00a0 The responses received indicates whether the port is used and can, therefore, be probed for weakness.<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Different-Types-of-port-scans-involve\"><\/span><b>Different Types of port scans involve:<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-weight: 400;\"> Vanilla \u2013 It is an attempt to connect to all ports. In all, there are 65,536 vanilla ports.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Strobe &#8211; The attempt to connect to only some of the selected ports. There are under 20 strobe ports.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Stealth scan &#8211; Numerous techniques for stealth scanning that attempts to prevent the request for the connection being logged.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> FTP Bounce Scan \u2013 There are attempts that are directed through a File Transfer Protocol (FTP) server to disguise the cracker&#8217;s location.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Fragmented Packets \u2013 This scanning is done by sending packet fragments that can get through simple packet filters in a firewall.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> UDP \u2013 In this Scan, the User looks for open User Datagram Protocol ports.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Sweep \u2013 Here the hacker scans the same port using a number of computer machines.\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><b>2.Network Scanning<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">A network scanner is an important element in the collection of the network administrator and penetration tester. This allows the user to map the network as well as to find the devices that would be hard to find manually. It also allows a security analyst or pen-tester to locate the devices on the network that could be likely to use to begin a breach into the network.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><i>Ethical Hackers need to follow these easy steps to get it into successful working:<\/i><\/b><\/p>\n<ol style=\"text-align: justify;\">\n<li><span style=\"font-weight: 400;\"> Identify the Active Hosts.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Gathering Information on the live target IP address of the vulnerable hosts in order to launch the attack.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Operating System detection using TCP\/IP fingerprinting where they send packets to the remote host and examines practically every bit in the responses.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> System Architecture is a method where specific weak spots are detected in the application software or the operating system which can be used to crush the system or compromise it for undesired purposes.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Enables version detection of a particular Service.\u00a0\u00a0<\/span><\/li>\n<\/ol>\n<p style=\"text-align: justify;\"><b>3.Vulnerability Scanning<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">This method is an inspection of the potential points of exploits on a system or network to identify the security holes. In the vulnerability scan, it detects and classifies the system&#8217;s weaknesses in computers, networks, and communication equipment. It then predicts the effectiveness of countermeasures.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">A vulnerability scanner attempts to log into the systems using default or other credentials which build a more detailed picture of the system. After it has built up an inventory, it checks each item in the inventory against one or more databases of known vulnerabilities. This is to see if any items are subject to any of these vulnerabilities.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The outcome of a vulnerability scan is a list of all the systems that are found and identifies on the network. In turn, highlighting any known weaknesses that need the hacker\u2019s whole attention.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><i>Vulnerabilities Scanning results into:<\/i><\/b><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-weight: 400;\"> Finding weaknesses in the system.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> And reports any false positive.\u00a0<\/span><\/li>\n<\/ul>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Tools-Used-for-Scanning\"><\/span><b>Tools Used for Scanning<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Various tools and techniques are used by hackers under the scanning process, which are as follows:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">Superscan<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Powerful Tool from Mcafee: TCP port scanner, pinger, hostname<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Zen Map<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Powerful Tool to detect OS, Version, Ping Sweep, Port Scanning, and more<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">wups<\/span><\/td>\n<td><span style=\"font-weight: 400;\">A Powerful UDP port scanner (works only in 32-bit system)<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Net Scan Tool suite pack<\/span><\/td>\n<td><span style=\"font-weight: 400;\">A collection of Tools: Port Scanners, Flooders, Web Rippers, Mass Emailers<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Hping3-Tool-for-Scanning\"><\/span><b>Hping3 Tool for Scanning<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">It is a network tool that enables to send custom TCP\/IP packet and display target replies like the ping program does with ICMP replies. Hping3 handles fragmentation, arbitrary packet body, and size. It can be used on order to transfer files compressed under supported protocols.<\/span><\/p>\n<p style=\"text-align: justify;\"><strong>Following are the examples of Hping3:<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">ICMP Ping<\/span><\/td>\n<td><span style=\"font-weight: 400;\">hping3 -1\/&#8211;icmp 192.168.1.1<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">ACK \/ UDP Scan on port 80<\/span><\/td>\n<td><span style=\"font-weight: 400;\">hping3 \u2013A 192.168.1.1 \u2013p 80 \/ hping3 -2 192.168.1.1 \u2013p 80<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Collecting initial sequence number<\/span><\/td>\n<td><span style=\"font-weight: 400;\">hping3 192.168.1.1 \u2013q \u2013p 139 \u2013S<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Firewall and timestamp<\/span><\/td>\n<td><span style=\"font-weight: 400;\">hping3 \u2013S 192.168.1.1 \u2013p 80 \u2013-tcp-timestamp<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">SYN scan on port range<\/span><\/td>\n<td><span style=\"font-weight: 400;\">hping3 -8\/&#8211;scan 1-100 \u2013S 192.168.1.1 -V<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Intercept all traffic containing HTTP <\/span>signature<\/td>\n<td><span style=\"font-weight: 400;\">hping3 -9 HTTP \u2013I eth0<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Flooding the victim<\/span><\/td>\n<td><span style=\"font-weight: 400;\">hping3 192.168.1.1 \u2013flood<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: justify;\"><b>Enumeration<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Enumeration makes a fixed active connection to the system and is the first attack on the target system. It is defined as the process of extracting user names, network resources, machine names, shares and services from the system. Under this phase, the attacker creates an active connection to the system and performs directed queries in order to gain more information about the target IP address and port.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The gathered info is then used to identify the vulnerabilities or weak points in the system security and tries to exploit the system gaining phase.\u00a0<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Tools-for-Enumeration\"><\/span><b>Tools for Enumeration<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><b>FTP Enumeration<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">It is a tool that is used for enumerating OS-level user accounts via the FTP service. It is fairly simple to modify to script to work against other vulnerable FTP servers such as BlackMoon FTP Server.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Superscan<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">It is a free port scanning networking tool that has the primary purpose of scanning an IP range. This tool supports extremely fast host discovery lookups as well as TCP and UDP port scans. Its multi-threaded and asynchronous techniques allow users to enter a hostname, IP or IP range and start the scan.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b>IP Tools<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Internet Protocol address is a number assigned to a machine that has a computer network and uses the IP for communicating.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Netstat<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">This displays an active connection for the Transmission Control Protocol (TCP) and lists the ports on which the computer is listening. It is useful for displaying statistics and enumerating open ports across multiple platforms.\u00a0<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"What-is-NetBios-Enumeration\"><\/span><b>What is NetBios Enumeration?<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">It stands for \u2018Network Basic Input Output System.\u2019 This system allows the computer to communicate over a LAN and to share the files and printers.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">NetBIOS is used to identify network devices over TCP\/IP Windows. NetBios must be unique on a network that is limited to 16 characters. The 15 characters are used for the device name and the 16th character is reserved for identifying the type of service running or name record type.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Attackers\/hackers use this enumeration to obtain:<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-weight: 400;\"> List of computers that belong to a domain<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> List of shares on the individual hosts on the network<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Policies and passwords<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><b>Counter Measures<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">1.Close Ports 135-139<\/span><\/p>\n<p style=\"text-align: justify;\">2.Disable NetBIOS over TCP\/IP<\/p>\n<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Phase-3\"><\/span><span style=\"color: #0000ff;\">Phase 3<\/span><span class=\"ez-toc-section-end\"><\/span><\/h1>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Gaining-Access\"><\/span><strong>Gaining Access<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">1. System Hacking<\/p>\n<p style=\"text-align: justify;\">2. Acquire Passwords<\/p>\n<p style=\"text-align: justify;\">3. Password Cracking Techniques<\/p>\n<p style=\"text-align: justify;\">4. Generate Rainbow Tables<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Password-Cracking\"><\/span><strong>Password Cracking<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">Now that the attacker has acquired the required information, He now tries to hack into the system.<\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">Non-Electronic Attack\u00a0<\/span><\/td>\n<td><span style=\"font-weight: 400;\"> Attacker need not to possess technical knowledge to crack passwords.\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Active Online Attack<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Attacker performs password cracking by directly communicating with the victim machine.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Passive Online Attack<\/span><\/td>\n<td><span style=\"font-weight: 400;\"> Attacker performs password cracking without communicating with the victim machine.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">O\ufb04ine Attack<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Attacker copies target\u2019s password \ufb01le and then tries to crack password in his own machine at a different location.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Active-Online-Attack\"><\/span>Active Online Attack<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table style=\"height: 299px;\" width=\"572\">\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">Dictionary Attack<\/span><\/td>\n<td><span style=\"font-weight: 400;\">A Dictionary \ufb01le is loaded into the cracking application that\u00a0<\/span><span style=\"font-weight: 400;\">runs against user accounts.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Brute Force Attack<\/span><\/td>\n<td><span style=\"font-weight: 400;\">The program tries every combination of characters until\u00a0<\/span><span style=\"font-weight: 400;\">the password is broken.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Rule Based Attack<\/span><\/td>\n<td><span style=\"font-weight: 400;\">The attack is used when the attacker gets some\u00a0<\/span><span style=\"font-weight: 400;\">information about the password.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Password-Cracking-Tools\"><\/span>Password Cracking Tools<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">Rtgen\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">WinRtgen\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Pwdump7\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Fgdump\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">LOphtcrack\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Ophcrack\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Cain &amp; Abel<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\"><strong>&#8212;&#8211;x&#8212;&#8211;<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ethical Hacking is a process to crack the vulnerabilities in the network which a malicious attacker may exploit, causing loss of data, financial loss, and other significant damages.<\/p>\n","protected":false},"author":1,"featured_media":3925,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_wp_applaud_exclude":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-184","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"featured_image_src":{"landsacpe":["https:\/\/www.dianapps.com\/blog\/wp-content\/uploads\/2019\/10\/Ethical-hacking-and-its-methodology-1-1140x445.jpg",1140,445,true],"list":["https:\/\/www.dianapps.com\/blog\/wp-content\/uploads\/2019\/10\/Ethical-hacking-and-its-methodology-1-463x348.jpg",463,348,true],"medium":["https:\/\/www.dianapps.com\/blog\/wp-content\/uploads\/2019\/10\/Ethical-hacking-and-its-methodology-1-300x124.jpg",300,124,true],"full":["https:\/\/www.dianapps.com\/blog\/wp-content\/uploads\/2019\/10\/Ethical-hacking-and-its-methodology-1.jpg",1440,594,false]},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.12 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ethical Hacking and Its Methodology - Learn About Digital Transformation &amp; Development | DianApps Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dianapps.com\/blog\/ethical-hacking-and-its-methodology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ethical Hacking and Its Methodology - Learn About Digital Transformation &amp; Development | DianApps Blog\" \/>\n<meta property=\"og:description\" content=\"Ethical Hacking is a process to crack the vulnerabilities in the network which a malicious attacker may exploit, causing loss of data, financial loss, and other significant damages.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dianapps.com\/blog\/ethical-hacking-and-its-methodology\/\" \/>\n<meta property=\"og:site_name\" content=\"Learn About Digital Transformation &amp; Development | DianApps Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-17T10:58:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dianapps.com\/blog\/wp-content\/uploads\/2019\/10\/Ethical-hacking-and-its-methodology-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"594\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vikash Soni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vikash Soni\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ethical Hacking and Its Methodology - Learn About Digital Transformation &amp; Development | DianApps Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dianapps.com\/blog\/ethical-hacking-and-its-methodology\/","og_locale":"en_US","og_type":"article","og_title":"Ethical Hacking and Its Methodology - Learn About Digital Transformation &amp; Development | DianApps Blog","og_description":"Ethical Hacking is a process to crack the vulnerabilities in the network which a malicious attacker may exploit, causing loss of data, financial loss, and other significant damages.","og_url":"https:\/\/www.dianapps.com\/blog\/ethical-hacking-and-its-methodology\/","og_site_name":"Learn About Digital Transformation &amp; Development | DianApps Blog","article_published_time":"2019-10-17T10:58:39+00:00","og_image":[{"width":1440,"height":594,"url":"https:\/\/www.dianapps.com\/blog\/wp-content\/uploads\/2019\/10\/Ethical-hacking-and-its-methodology-1.jpg","type":"image\/jpeg"}],"author":"Vikash Soni","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vikash Soni","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.dianapps.com\/blog\/ethical-hacking-and-its-methodology\/","url":"https:\/\/www.dianapps.com\/blog\/ethical-hacking-and-its-methodology\/","name":"Ethical Hacking and Its Methodology - Learn About Digital Transformation &amp; Development | DianApps Blog","isPartOf":{"@id":"https:\/\/www.dianapps.com\/blog\/#website"},"datePublished":"2019-10-17T10:58:39+00:00","dateModified":"2019-10-17T10:58:39+00:00","author":{"@id":"https:\/\/www.dianapps.com\/blog\/#\/schema\/person\/0126fafc83e42bece2acbfe92f7d0f4f"},"breadcrumb":{"@id":"https:\/\/www.dianapps.com\/blog\/ethical-hacking-and-its-methodology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dianapps.com\/blog\/ethical-hacking-and-its-methodology\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.dianapps.com\/blog\/ethical-hacking-and-its-methodology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dianapps.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ethical Hacking and Its Methodology"}]},{"@type":"WebSite","@id":"https:\/\/www.dianapps.com\/blog\/#website","url":"https:\/\/www.dianapps.com\/blog\/","name":"Learn About Digital Transformation &amp; Development | DianApps Blog","description":"Dianapps","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dianapps.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dianapps.com\/blog\/#\/schema\/person\/0126fafc83e42bece2acbfe92f7d0f4f","name":"Vikash Soni","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dianapps.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/dianapps.com\/blog\/wp-content\/uploads\/2022\/07\/cropped-vikash-96x96.png","contentUrl":"https:\/\/dianapps.com\/blog\/wp-content\/uploads\/2022\/07\/cropped-vikash-96x96.png","caption":"Vikash Soni"},"description":"Vikash Soni, the visionary CEO and Co-founder of DianApps. With his profound expertise in Android and iOS app development, he leads the team to deliver top-notch solutions to clients worldwide. Under his guidance, the company has achieved remarkable success, earning a reputation as a leading web and mobile app development company.","sameAs":["https:\/\/www.linkedin.com\/in\/vikash-soni-59726530\/"],"url":"https:\/\/www.dianapps.com\/blog\/author\/infodianapps-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dianapps.com\/blog\/wp-json\/wp\/v2\/posts\/184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dianapps.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dianapps.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dianapps.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dianapps.com\/blog\/wp-json\/wp\/v2\/comments?post=184"}],"version-history":[{"count":0,"href":"https:\/\/www.dianapps.com\/blog\/wp-json\/wp\/v2\/posts\/184\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dianapps.com\/blog\/wp-json\/wp\/v2\/media\/3925"}],"wp:attachment":[{"href":"https:\/\/www.dianapps.com\/blog\/wp-json\/wp\/v2\/media?parent=184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dianapps.com\/blog\/wp-json\/wp\/v2\/categories?post=184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dianapps.com\/blog\/wp-json\/wp\/v2\/tags?post=184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}